Sciweavers

802 search results - page 17 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
APCHI
2008
IEEE
14 years 2 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
ICCSA
2005
Springer
14 years 1 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
ACISICIS
2005
IEEE
14 years 1 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...
APNOMS
2009
Springer
14 years 2 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong
WISTP
2007
Springer
14 years 1 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius